The Internet and computer networking means that there is a need for new security measures to reduce the threats and challenges inherent from these new technologies and software applications and network devices. Information, network equipments, transmission media, computer systems, and servers are subject to threats. “Yet the use of information and communication technologies has increased the incidents of computer abuse.” Computer security involves safeguarding computing resources, ensuring data integrity, limiting access to authorized users, and maintaining data confidentiality. Effective computer security therefore involves taking physical security measures (to ensure hardware and media are not stolen or damaged), minimizing the risk and implications of error, failure or loss (for example by developing a resilient back-up strategy), appropriate user authentication (for example by employing strong pass wording), and possibly the encryption of sensitive files. We live in a world where "information wants to be free" and in which people are getting used to having access to whatever information they want anytime, anywhere and from a wider range of computing devices. Unfortunately, in terms of the security and control of the resources to which computers permit access, this can prove quite a problem. Indeed, many users unfortunately often view security and control measures as inhibitors to effective computer use.

The student’s awareness about computer security measures can be a big help to them to acquire some knowledge about protection of their digital asset. In this sense, the students acquire knew knowledge on how to use computer security measures in order to protect all the data stored in their computer system. Because of the computers evolution, the researchers want to share the implications on how important the computer security measures, so that the respondents will be able to know on how to handle some cases in the future. Globally, the most used computer security measures are Anti-virus programs are the most frequently used tools to protect computer systems, and they must be upgraded regularly to protect against any new viruses. Firewall is different from anti-virus software, which simply verifies that a file is virus free. You can also add an anti-spy ware program. Spy ware is a small program downloaded onto your computer via the internet, usually with your approval, to collect information. Anti-spy ware operates a lot like an anti-virus program, but its role is to prevent malicious spy ware (or malware) from sneaking onto your computer and transmitting your personal data. Firewall intercepts and controls traffic between networks with differing levels of trust. It is part of the network perimeter defense of an organization and should enforce a network security policy. By Cheswick's and Bellovin's definition, it provides an audit trail. A firewall is a good place to support strong user authentication as well as private or confidential communications between firewalls. As pointed out by Chapman and Zwicky [2] , firewalls are an excellent place to focus security decisions and to enforce a network security policy. They are able to efficiently log internet work activity, and limit the exposure of an organization. The exposure to attack is called the "zone of risk." If an organization is connected to the Internet without a firewall, every host on the private network can directly access any resource on the Internet. Or to put it as a security officer might, every host on the Internet can attack every host on the pri vate network....

YOU MAY ALSO FIND THESE DOCUMENTS HELPFUL

...Level of Awareness of CIT StudentsaboutComputer Maintenance
Submitted by:
Bobbie Manuel dela Peña
Eric Jan Diamonon
Juliette Maglinte
Mia Sugabo
University of Negros Occidental-Recoletos, College of Information Technology
March 2013
Chapter I: Introduction
Statement of the Problem: How aware are the Information Technology students of UNO-R when it comes to Computer...

...
SecurityMeasures
Argosy University: MGT330
When it comes to security and the protection of proprietary and sensitive information, there can be no excuse to not have the best available safeguards in place. Security breaches come in many different shapes and sizes. They can be orchestrated by massive units that aim at breaching sensitive information hubs and leaking that information to the public. An...

...ComputerSecurity
Victoria M. Deardorff
Brevard Community College
April 10, 2012
This paper is written as a basic overview of computersecurity for the non-technical user. This paper is meant to educate the reader on practical steps that can be implemented to secure their home-based computers. Additionally, the reader will be informed of industry and government needs for and methods of computer...

...ComputerSecurityStudent Name
University
Abstract
James works for a bank, and he spends most of his attending to bank clients and travelling. He always carries with him a laptop that contains confidential bank information. The Operating System of the laptop was last updated in May 2011. Some of the programs James uses are MS word 2007, MS Access and MS Excel. James’ computer is, however, not well secured. It does not have a...

...﻿1. ComputerSecurity protection
Computersecurity (also known as cybersecurity or IT security) is information security as applied to computing devices such as computers and smartphones, as well as computer networks such as private and public networks, including the whole Internet.
The field covers all the processes and mechanisms by which digital equipment, information and a...

...﻿1. ComputerSecurity protection
Computersecurity (also known as cybersecurity or IT security) is information security as applied to computing devices such as computers and smartphones, as well as computer networks such as private and public networks, including the whole Internet.
The field covers all the processes and mechanisms by which digital equipment, information and a...

...Summary
The purpose of computersecurity is to protect an organization’s valuable resources, such as information, hardware and software. With the increase in computer crimes, the role of security within organizations has taken on a new meaning and importance in recent years.
This proposal will address the organization’s security policies and procedures, their defense on security...

Study Tools

Company

Follow

{"hostname":"studymode.com","essaysImgCdnUrl":"\/\/images-study.netdna-ssl.com\/pi\/","useDefaultThumbs":true,"defaultThumbImgs":["\/\/stm-study.netdna-ssl.com\/stm\/images\/placeholders\/default_paper_1.png","\/\/stm-study.netdna-ssl.com\/stm\/images\/placeholders\/default_paper_2.png","\/\/stm-study.netdna-ssl.com\/stm\/images\/placeholders\/default_paper_3.png","\/\/stm-study.netdna-ssl.com\/stm\/images\/placeholders\/default_paper_4.png","\/\/stm-study.netdna-ssl.com\/stm\/images\/placeholders\/default_paper_5.png"],"thumb_default_size":"160x220","thumb_ac_size":"80x110","isPayOrJoin":false,"essayUpload":false,"site_id":1,"autoComplete":false,"isPremiumCountry":false,"userCountryCode":"US","logPixelPath":"\/\/www.smhpix.com\/pixel.gif","tracking_url":"\/\/www.smhpix.com\/pixel.gif","cookies":{"unlimitedBanner":"off"},"essay":{"essayId":36817627,"categoryName":"Fiction","categoryParentId":"17","currentPage":1,"format":"text","pageMeta":{"text":{"startPage":1,"endPage":6,"pageRange":"1-6","totalPages":6}},"access":"premium","title":"Level of Awareness of First Year Bsit Students About Computer Security Measures","additionalIds":[3,5,7,93],"additional":["Business \u0026 Economy","Computer Science","Education","Education\/Greek System"],"loadedPages":{"html":[],"text":[1,2,3,4,5,6]}},"user":null,"canonicalUrl":"http:\/\/www.studymode.com\/essays\/Level-Of-Awareness-Of-First-Year-1347758.html","pagesPerLoad":50,"userType":"member_guest","ct":10,"ndocs":"1,500,000","pdocs":"6,000","cc":"10_PERCENT_1MO_AND_6MO","signUpUrl":"https:\/\/www.studymode.com\/signup\/","joinUrl":"https:\/\/www.studymode.com\/join","payPlanUrl":"\/checkout\/pay","upgradeUrl":"\/checkout\/upgrade","freeTrialUrl":"https:\/\/www.studymode.com\/signup\/?redirectUrl=https%3A%2F%2Fwww.studymode.com%2Fcheckout%2Fpay%2Ffree-trial\u0026bypassPaymentPage=1","showModal":"get-access","showModalUrl":"https:\/\/www.studymode.com\/signup\/?redirectUrl=https%3A%2F%2Fwww.studymode.com%2Fjoin","joinFreeUrl":"\/essays\/?newuser=1","siteId":1,"facebook":{"clientId":"306058689489023","version":"v2.8","language":"en_US"},"analytics":{"googleId":"UA-32718321-1"}}